Alerting

Want to set up alert for No data found.

kamal_jagga
Contributor

Hi,

The data coming in to my indexer is intermittent. So i want to set up an alert when no data is coming.

Kindly advise.

Tags (2)
0 Karma
1 Solution

kamal_jagga
Contributor

Wrote this search to solve this issue:

index=*cricket*|dedup team|table team| lookup playerslist player AS team OUTPUT player AS playermatch | where playermatch!="matched"

View solution in original post

0 Karma

kamal_jagga
Contributor

Wrote this search to solve this issue:

index=*cricket*|dedup team|table team| lookup playerslist player AS team OUTPUT player AS playermatch | where playermatch!="matched"
0 Karma

somesoni2
Revered Legend

Find a suitable query to identify the data is coming to your indexer from the host. An example query could be like this

index=yourIndex sourcetype=yoursourcetype host=yourhost | head 1

Run the search for suitable timerange as per your threshold (like if you want to configure an alert if no data has come for 60 mins, use timerange as last 60 mins) and saved the search as alert. See more details here http://docs.splunk.com/Documentation/Splunk/6.2.4/Alert/Setupalertactions#Configure_email_notificati...

0 Karma

kamal_jagga
Contributor

Thanks. This works in a search. but when i am saving it as an alert. i am not getting anything.

I want it to alert when the events found=0.

0 Karma
Get Updates on the Splunk Community!

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer at Splunk .conf24 ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...

Share Your Ideas & Meet the Lantern team at .Conf! Plus All of This Month’s New ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...

Combine Multiline Logs into a Single Event with SOCK: a Step-by-Step Guide for ...

Combine multiline logs into a single event with SOCK - a step-by-step guide for newbies Olga Malita The ...